Security Bulletin
Summary
WebSphere Application Server is shipped as a component of IBM Business Process Manager, WebSphere Process Server, WebSphere Dynamic Process Edition, and WebSphere Lombardi Edition. Information about security vulnerabilities affecting WebSphere Application Server has been published in security bulletins (CVE-2016-0359, CVE-2016-0377, CVE-2016-0385, CVE-2016-1181, CVE-2016-1182, CVE-2016-2960, CVE-2016-3485, CVE-2016-3092,CVE-2016-5986, CVE-2016-5983).
Vulnerability Details
Consult the security bulletin
- Security Bulletin: HTTP Response Splitting in WebSphere Application Server (CVE-2016-0359)
- Security Bulletin: Vulnerabilities in Apache Struts affects IBM WebSphere Application Server (CVE-2016-1181 and CVE-2016-1182)
- Security Bulletin: Information Disclosure in IBM WebSphere Application Server (CVE-2016-0377)
- Security Bulletin: Information Disclosure in IBM WebSphere Application Server Liberty (CVE-2016-0378)
- Security Bulletin: Bypass security restrictions in WebSphere Application Server (CVE-2016-0385)
- Security Bulletin: Potential denial of service with SIP Services (CVE-2016-2960)
- Security Bulletin: Multiple vulnerabilities in IBM® Java SDK affects WebSphere Application Server July 2016 CPU (CVE-2016-3485)
- Security Bulletin: Apache Commons FileUpload Vulnerability affects WebSphere Application Server (CVE-2016-3092)
- Security Bulletin: Potential Information Disclosure vulnerability in WebSphere Application Server (CVE-2016-5986)
- Security Bulletin: Multiple Denial of Service vulnerabilities with Expat may affect IBM HTTP Server
- Security Bulletin: Cross-site scripting vulnerability in IBM WebSphere Application Server Liberty Profile (CVE-2016-3042)
- Security Bulletin: Open Redirect vulnerability in WebSphere Application Server Liberty (CVE-2016-3040)
- Security Bulletin: Code execution vulnerability in WebSphere Application Server (CVE-2016-5983)
Affected Products and Versions
- WebSphere Process Server V7.x
- WebSphere Dynamic Process Edition V7.x
- WebSphere Lombardi Edition V7.2.0.x
- IBM Business Process Manager V7.5.0.0 through V7.5.1.2
- IBM Business Process Manager V8.0 through V8.0.1.3
- IBM Business Process Manager V8.5.0 through V8.5.0.2
- IBM Business Process Manager V8.5.5
- IBM Business Process Manager V8.5.6 through V8.5.6.0 cumulative fix 2
- IBM Business Process Manager V8.5.7 through V8.5.7.0 cumulative fix 1
For earlier unsupported versions of the products, IBM recommends upgrading to a fixed, supported version of the product.
Workarounds and Mitigations
None
Get Notified about Future Security Bulletins
Important Note
IBM strongly suggests that all System z customers be subscribed to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the System z Security web site. Security and integrity APARs and associated fixes will be posted to this portal. IBM suggests reviewing the CVSS scores and applying all security or integrity fixes as soon as possible to minimize any potential risk.
References
Acknowledgement
CVE-2016-5983 reported to IBM by Federico Dotta and Maurizio Agazzini at Mediaservice.net S.r.l.
Change History
2016-09-30: Original Version Published
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Was this topic helpful?
Document Information
Modified date:
15 June 2018
UID
swg21986205